Foundations of Symmetry Breaking Revisited Revised

Size: px
Start display at page:

Download "Foundations of Symmetry Breaking Revisited Revised"

Transcription

1 Foundations of Symmetry Breaking Revisited Revised Tim Januschowski, Barbara M. Smith, and M.R.C. van Dongen Abstract Puget s article On the Satisfiability of Symmetrical Constraint Satisfaction Problems [Puget, 1993] is widely acknowledged to be one of the founding papers in symmetry breaking (see for example [Flener et al., 2006; Rossi et al., 2006; Walsh, 2006]). To date, Puget s definition of a valid reduction seems to be the only common ground that all authors on static symmetry breaking constraints agree on. His original definition of a valid reduction is for a restricted form of variable symmetries. We extend Puget s definition to the recent, more general definition of symmetries by Cohen et al. [Cohen et al., 2006]. In our extension, we require a valid reduction to be a tighter constraint satisfaction problem instead of one with more constraints. We re-prove both his central theorems on valid reductions for our definition and we prove considerably stronger results on the existence of valid reductions with further properties. Along the way, we present examples which contradict the common believe that we can always eliminate all symmetries with lexicographic ordering constraints. 1 Introduction Symmetries are a common property of Constraint Satisfaction Problems (CSPs). In practice, symmetries often are a key to an effective solution of symmetric CSPs: only if we properly exploit the symmetries may we solve such CSPs within a reasonable time. The classic approach to dealing with symmetries is the addition of dedicated constraints before search. These constraint are traditionally called symmetry breaking constraints. This is the most commonly used symmetry breaking approach in practice and it receives consid- Tim Januschowski is supported by the EMBARK initiative by the Irish Research Council for Science, Engineering and Technology; Cork Constraint Computation Centre and Computer Science Department, University College Cork, Ireland janus@cs.ucc.ie School of Computing, University of Leeds, UK Computer Science Department, University College Cork, Ireland erable attention. We consider the theoretical foundations of the addition of symmetry breaking constraints in the present work following Puget [Puget, 1993]. Puget s approach to introduce symmetry breaking constraints [Puget, 1993] for a given CSP is via the definition of a related CSP that he calls a valid reduction. Although he presents a specific symmetry breaking constraint to prove the existence of a valid reduction, valid reductions themselves are defined without dependence on any specific symmetry breaking constraint. To date, valid reductions seem to be the only common ground that authors on symmetry breaking constraints agree on. The definition of a valid reduction is the foundation of all symmetry breaking constraints as diverse as they may be: general lexicographic ordering constraints [Crawford et al., 1996], columninequalities in Integer Programming [Kaibel and Pfetsch, 2008] or problem-specific symmetry breaking constraints in Satisfiability [Shlyakhter, 2007] and in Constraint Programming (CP) [Cambazard et al., 2009]. These constraints differ in so many aspects, that valid reductions may offer the only framework to compare the different symmetry breaking constraints. Furthermore, valid reductions offer a means to study the theoretical effects of the addition of symmetry breaking constraints. This is the reason why an investigation of valid reductions is important for the current research on symmetry breaking constraints. We see valid reductions as a first step towards a general theory of symmetry breaking constraints. In the present work, we informally revisit Puget s definition of a valid reduction. Puget crafted his definition for a restricted form of variable symmetry. However, the recent definition of symmetries by Cohen et al. [Cohen et al., 2006] is much wider. We provide their formal definition in Section 2 where we also define our notation. Cohen et al. identify the microstructure complement as the basic structure for reasoning about symmetries. In Section 3.1 we carry Puget s definition of a valid reduction over to the recent, more general definition of symmetry by Cohen et al. [Cohen et al., 2006] using microstructure complements. We add a slightly different emphasis to the original definition by requiring a valid reduction to be a tighter CSP than the original CSP. Our focus on microstructure complements makes this shift in emphasis seem natural. With a simple example in Section 3.2, we show that adding Puget s constraints may not change the CSP. This underlines the importance of our change of em-

2 phasis in the definition. The example shows a trivial alternative to prove Puget s main existence theorem. Therefore, we suggest that Puget s constraint with which he proves the existence of a valid reduction is his main contribution. With another example, we question the usual interpretation of his paper, namely that Puget proved that symmetries can always be eliminated by the addition of suitable constraints (Walsh [Walsh, 2006]). We present a simple example of a valid reduction that may still have some of the original symmetries when we add the ordering constraints that Puget suggests. We identify the cases in which we can find a valid reduction that differs from the original CSP and we prove stronger versions of Puget s central theorems. We show an example of a CSP that has symmetries, which cannot be eliminated with the traditional methods. To the best of our knowledge, it thus really is an open question when we can eliminate symmetries. In Section 3.3, we consider valid reductions with further properties. We summarise our work in Section 4. We present open questions along the way. 2 Preliminary Definitions Let us introduce some notation and graph theoretic concepts that we will need in the following. We define a CSP P as the triple (X, D, C), where X is the list of variables of P, D(x) is the domain of the variable x X, and where C is the set of constraints of P. Since we are interested in theoretical results, we mainly consider constraints in extensional form. Each constraint c has an arity k and consists of a scope and a relation. The scope of a k-ary constraint c is a sequence x 1,..., x k and the relation of c is a subset of the Cartesian product of the domains of the variables in the scope. We say that the tuples in the relation of c are allowed by c. All other tuples are forbidden by c. We also call a forbidden tuple a no-good. For ease of presentation, we exclude CSPs that have variables with empty domains. We further assume that in the domain of a variable no values exist that are forbidden by a unary constraint. We call a (variable,value)-assignment a literal. A solution of P is an assignment of values to all variables that is allowed by all constraints. If a solution exists, we say that P is satisfiable, otherwise P is unsatisfiable. The following is an example of a CSP. Example 1. Consider a CSP with 2 variables x and y, each with domain {1, 2} and one extensional constraint that only allows {(x, 2), } and forbids all other tuples. This CSP is satisfiable and the only solution is {(x, 2), }. We typically denote a hypergraph G as a tuple (V, E) with V or V (G) the set of nodes and E or E(G) 2 V the set of hyperedges. For ˆV V, we denote the induced subgraphs of G by G[ ˆV ]. The induced subgraph is a hypergraph G[ ˆV ] = ( ˆV, Ê), where Ê = {{v 1,..., v r } E : v 1,..., v r ˆV }, i.e., all nodes of every edge in G[ ˆV ] are in ˆV. Let us associate a hypergraph to every CSP instance. Definition 2 (Microstructure Complement [Freuder, 1991; Jégou, 1993]). With every CSP P = (X, D, C) we associate a hypergraph G. We call this hypergraph the microstructure complement (MSC) of P. The nodes of G are the elements of the set of literals x X {x} D(x). A set of nodes {(x 1, t 1 ), (x 2, t 2 ),..., (x k, t k )} is a hyperedge of the MSC if: a constraint in P with scope {x 1, x 2,..., x k }, k > 1 exists that forbids the tuple t 1,..., t k k = 2, x 1 = x 2 and t 1 t 2. For binary CSPs, this graph is the complement of the microstructure [Freuder, 1991; Jégou, 1993], as the name microstructure complement suggests. We want to define the MSC as a loop-free hypergraph, which explains why k > 1. More specifically, we assume that literals forbidden by unary constraints do not appear as nodes in the MSC. The MSC is a simple hypergraph, i.e., it does not have parallel hyperedges. A stable set in a hypergraph G is a set of nodes, ˆV, such that G[ ˆV ] does not contain any hyperedge. The MSC that corresponds to some CSP with n variables admits a maximum stable set of size at most n. A CSP with n variables is satisfiable if and only if its MSC contains a stable set with n nodes. Each stable set with n nodes corresponds to a solution in the CSP and vice versa. A clique ˆV is a set of nodes in the graph G such that G[ ˆV ] is the complete graph. In a binary CSP P with n variables, each clique with n nodes in the microstructure of P corresponds to a solution and vice versa. In Figure 1a, we have depicted the MSC of the CSP in Example 1. The MSC contains one maximum stable set of size 2 consisting of the nodes {(x, 2), }. The maximum stable set corresponds to the only solution of the CSP. We remind the reader of the following graph theoretic definition that is the basis for our definition of symmetries for CSPs. Definition 3 (Graph Automorphism). Let G = (V, E) be a hypergraph and let φ : V V be a bijective function. For ˆV V, we shall write φ( ˆV ) to denote v ˆV {φ(v)}. We call φ a graph automorphism if it has the following property: for any hyperedge e of G, φ(e) also is a hyperedge of G. Note, that any automorphism also maps non-hyperedges to non-hyperedges. We denote the group of automorphisms of a hypergraph G by aut(g). The action of the group aut(g) on the set of nodes is the permutation of the set of nodes as a result of the automorphisms. We say that aut(g) acts on the set of nodes. The orbit of a set of nodes ˆV in G is the set of all images of ˆV under the action of aut(g). We denote it by orbit( ˆV, aut(g)) or simply orbit( ˆV ) if it is clear which group is meant. From now on, we shall write graph instead of hypergraph. The following definition, by Cohen et al. [Cohen et al., 2006], is the current state-of-the-art for symmetry definitions in CP. Definition 4 (Constraint Symmetry [Cohen et al., 2006]). Let G be the MSC of a CSP P. A constraint symmetry of P is an element of aut(g). We shall abbreviate constraint symmetries to symmetries. Cohen et al. [Cohen et al., 2006] show that another commonly used definition for symmetries in CP is equivalent to Definition 4 with an enhanced MSC. They call this symmetry solution symmetry. Our results can be carried over for solution

3 (x, 2) (a) The MSC of the CSP in Example 1. (x, 2) (b) The MSC of a valid reduction. Figure 1: The MSC of the CSP in Example 1 and one of its valid reductions. The solution {(x, 2), } is marked in gray. The solution is invariant under the symmetries and is a maximum stable set. symmetries. However, due to space restrictions, we shall omit references to solution symmetries. Symmetries act on the literals or the set of nodes in the MSC, i.e., for a CSP (X, D, C), the symmetries act on x X {x} D(x). We define a variable symmetry as a special class of symmetries. Symmetry φ is a variable symmetry if φ maps (x, v) to (ψ(x), v), where ψ is some suitably chosen bijective function on the variables. We say that a variable symmetry acts on the variables of a CSP. In his paper, Puget [Puget, 1993] considers a restricted form of variable symmetry. He only allows variable symmetries that act on variables in the scope of a symmetric constraint. In Example 1, the following symmetries are among the symmetries of the MSC: the identity, which is a symmetry of any CSP, and a self-inverse symmetry φ that swaps with and (x, 2) with. The symmetry φ is a variable symmetry also in Puget s sense. Definition 4 incorporates Puget s definition of symmetries and allows for more symmetries. We refer the interested reader to [Cambazard et al., 2009] for a particularly nice example of a symmetry which is not a variable symmetry. Having defined what the symmetries of a CSP are, we proceed by defining a symmetric CSP. Clearly, the identity is an automorphism of any CSP. It is natural to exclude CSPs whose only automorphism is the identity from being called symmetric CSPs. We exclude another, arguably trivial, class of CSPs from being called symmetric. If every variable has not more than one value in its domain, satisfiability can be checked in polynomial time. If the CSP is satisfiable, the symmetry group consists of all permutations of the literals. Excluding this class of CSPs from being called symmetric, we obtain the following definition. Definition 5 (Symmetric CSP). A CSP having at least one variable with domain size strictly larger than 1 is symmetric if the size of the symmetry group is larger than 1. Note that an empty CSP is not symmetric according to this definition. As we have seen before, the CSP from Example 1 has one solution and admits several symmetries. Therefore, the CSP is symmetric and each symmetry maps this solution to itself. We now have all basic ingredients to extend Puget s definition of a valid reduction in the following section. 3 Valid Reductions Symmetries partition the set of solutions into orbits. Symmetry breaking constraints have the property that they allow at least one solution in every orbit of solutions. Put differently, the addition of a symmetry breaking constraint should always produce a CSP with a representative of each orbit of solutions: an orbit representative. This is the defining property of Puget s valid reduction. 3.1 Definition of Valid Reduction Puget defines a valid reduction as a CSP with strictly more constraints than the original, possibly symmetric CSP such that for every orbit of solutions at least one orbit representative remains. He defines valid reductions for a restricted form of variable symmetries. We extend this to more general symmetries as in Definition 4. By focussing on the MSC as in Definition 4, it seems natural to substitute fewer partial solutions for more constraints. The following is our definition. Definition 6 (Valid Reduction). Let P = (X, D, C) be a CSP with n variables, MSC G and symmetry group aut(g). Let P = (X, D, C) be a CSP with the same variables as P, D(x) D(x) for all x X. We call P a valid reduction of P if the MSC G of P fulfils the following conditions: 1. a) V ( G) V (G) and b) E(G[V ( G)]) E( G), and 2. for every maximum stable set S of size n in G, at least one element in orbit(s) exists in G. Let us comment on this definition. According to the definition, we can produce a valid reduction in two ways only. The first way to produce a valid reduction is by removing nodes from the MSC, Condition 1a). This is equivalent to adding a unary constraint. The second way to produce a valid reduction is by adding hyperedges to the MSC of the CSP, Condition 1b). This is equivalent to adding a constraint of arity 2 or higher to the CSP. For microstructures of binary CSPs, we may produce a valid reduction by removing a node or removing an edge. Any constraint that we add to the original CSP to obtain a valid reduction cannot exclude entire orbits of solutions. The existence of an orbit representative ensures that we can reconstruct all solutions of the original CSP by applying the symmetries to the orbit representatives in the original CSP. A valid reduction is defined in terms of removing symmetric solutions rather than eliminating symmetries. However, by removing symmetric solutions, we may also eliminate some symmetries. Definition 6 does not state that a valid reduction is defined only for symmetric CSPs in the sense of Definition 5. We only refer to the group of automorphisms. This group always contains the identity. In this, we have followed Puget. Definition 6 is an extension of Puget s original definition since we allow for more general symmetries to define the orbits. We stress that we may add unary constraints to a CSP by removing nodes. Puget implicitly allows unary constraints in his definition, though at the core of [his] method is adding ordering constraints [Puget, 1993]. We disallow unary constraints that remove all literals corresponding to a variable. Though this may reduce symmetries, it may make it too difficult to relate a valid reduction to the original CSP and to reconstruct solutions. Further work will address this.

4 Definition 6 substitutes fewer stable sets in the MSC they correspond to fewer partial or full solutions for higher number of constraints. We ensure fewer stable sets in our definition by requiring the MSC of a valid reduction to either have fewer nodes (Condition 1a) or having more edges on the set of nodes in the MSC that the valid reduction and the original CSP have in common (Condition 1b). We shall say that a valid reduction with fewer stable sets in its MSC than the original MSC is tighter. This change in the definition is motivated by the fact that a higher number of constraints in Puget s sense could mean a mere repetition of an already present constraint. We defer a discussion on the existence of valid reductions to Section 3.2. First, we present a result that ties the satisfiability of a symmetric CSP to the satisfiability of a valid reduction of the CSP. Puget first proved this theorem. We extend it to the larger class of symmetries as in Definition 4 using our definition of valid reduction. Puget s original theorem is a sufficient condition for the satisfiability of a symmetric CSP in terms of valid reductions. We strengthen it to provide a characterisation. Theorem 7. A symmetric CSP P is satisfiable if and only if any valid reduction of P is satisfiable. Proof. If the CSP P is satisfiable, then any valid reduction needs to have at least one solution by definition and is hence satisfiable. If the CSP P is unsatisfiable, then its MSC does not have a stable set of size n, where n is the number of variables. According to Definition 6, the MSC of any valid reduction contains fewer nodes and possibly more edges when comparing induced subgraphs corresponding to the same set of nodes. Hence, the MSC of any valid reduction has a maximum stable set that is at most as large as the maximum stable set in the original MSC. Since we did not use symmetries that are not the identity in the above proof, Theorem 7 holds for CSPs that are not symmetric as well. Corollary 8. A CSP P is satisfiable if and only if any valid reduction of P is satisfiable. 3.2 Existence Of Valid Reductions Besides Theorem 7, Puget s other central result is the existence of a valid reduction for symmetric CSPs. Before we prove this result for our Definition 6, let us briefly discuss Puget s proof for variable symmetries. In a CSP with a variable symmetry φ that maps a variable x to a different variable y, Puget shows that the addition of the constraint x y to the original CSP produces a valid reduction. Indeed, the constraint does not exclude an entire orbit of solutions and this valid reduction has one constraint more than the original CSP. We believe that inventing the symmetry breaking constraint x y is the more important achievement compared to the proof of the existence of a valid reduction. Let us clarify this using Example 1 where we have a symmetry between the variables x and y. This would have been a symmetry in Puget s terminology as well. Since we add the constraint x y to the CSP, this valid reduction has a higher number of (x, 3) (x, 2) Figure 2: The microstructure of Example 9. constraints. The addition of constraint x y, however, does not change the MSC at all. Example 1 shows that producing a tighter valid reduction with Puget s constraints is not always possible. If the existence theorem, rather than the symmetry breaking constraint, was the main result, then Puget could have proved the theorem also by introducing a constraint that is a copy of an already existing constraint. Let us give another example that shows that adding ordering constraints to a symmetric CSP may result in valid reductions which are more symmetric than the original CSP, as promised in Section 1. Example 9. Consider a CSP with two variables x and y. The domain of both variables is {1, 2, 3} and the constraint between x and y allows {, }, {(x, 3), } and {(x, 3), }. The microstructure of this CSP is depicted in Figure 2. Let us consider two symmetries in particular. The first symmetry, ψ, swaps (x, 2) with and is the identity on all other literals. The second symmetry, φ, swaps (x, 3) with as well as with and is the identity on all other literals. In total, the size of the symmetry group is 4. If we only allow the addition of ordering constraints, then any proper valid reduction of this CSP would actually be more symmetric. In particular, the symmetry φ cannot be removed through the addition of an ordering constraint, e.g., y x. We show the microstructure of a valid reduction in Figure 3. The symmetry ψ that swaps (x, 2) with still exists in this valid reduction. Symmetry φ does not exist any more, but a symmetry that swaps with. The size of the symmetry group of the valid reduction is 12. The symmetry group of this valid reduction is larger than the symmetry group of the original CSP. It has been noted before [Cohen et al., 2006] that adding symmetry breaking constraints to eliminate constraint symmetries may result in a CSP that has symmetries that Cohen et al. call solution symmetries [Cohen et al., 2006]. Example 9 shows that adding ordering constraints may augment the number of constraint symmetries as well, simply because in this example solution symmetries and constraint symmetries are the same. In Example 9, we can only eliminate the symmetries by removing nodes. We have depicted a valid reduction with a removed node in Figure 4. While this valid reduction does not contain an original symmetry or a restriction of an original symmetry, its symmetry group is as large as the symmetry group of the original CSP. Example 9 also shows that more than one valid reduction of a CSP may exist. As an example, in Figures 3 and 4 we depict the microstructures of two valid reductions of the CSP in Example 9.

5 (x, 3) (x, 2) Figure 3: Adding y x to the CSP in Example 9 produces the above microstructure of a valid reduction with a larger symmetry group than the original CSP. (x, 3) Figure 4: The microstructure of a tighter valid reduction of Example 9 having added x y and x 2 to the CSP in Example 9. In Definition 6, we do not require a valid reduction to be strictly tighter. Any CSP, symmetric or not, is a valid reduction of itself. Hence, we obtain the following generalisation of Puget s original existence theorem for valid reductions for free. Theorem 10 ([Puget, 1993]). Every CSP has a valid reduction. When we reason about the existence of valid reductions, we must therefore be interested in showing the existence of a valid reduction that is strictly tighter than the original, symmetric CSP. We introduce this concept in the following definition. Definition 11 (Proper Valid Reduction). Let P be a valid reduction of a CSP P. If the MSC of P contains strictly fewer, not necessarily maximum, stable sets than the MSC of P, then we call P a proper valid reduction. We have seen in Example 1 that it is not always possible to find a proper valid reduction by adding an ordering constraint. We show a proper valid reduction of the CSP in Example 1 in Figure 1b obtained by adding a unary constraint. The empty CSP is an example of a CSP that is not symmetric according to Definition 5 and that does not allow a proper valid reduction. The following theorem answers the question which symmetric CSPs admit a proper valid reduction. Theorem 12. A symmetric CSP has a proper valid reduction if and only if it has a partial solution that is not part of a solution or it has a symmetry φ that maps a solution S to a solution φ(s) such that S φ(s). Proof. Let our symmetric CSP P have n variables and MSC G. A partial solution of P corresponds to a stable set in G. ( ) For the sake of contraposition, let us assume that in G each stable set is contained in a maximum stable set of size n and that all symmetries map any solution into itself. We cannot delete a node since that would destroy the only candidate for the orbit representative in the orbit. We cannot add a hyperedge between any set of nodes that is a partial set: any such set of nodes is part of a solution by assumption and excluding this set of nodes would destroy the only candidate for the orbit representative. Hence, no proper valid reduction exists. ( ) We will show the existence of a proper valid reduction with MSC G. We remind the reader that according to Definition 5, P has at least one variable with domain size strictly larger than 1. Let P have n variables. The structure of this proof is a case differentiation. We will show that P admits a proper valid reduction with MSC G in each of the following cases: 1. P is unsatisfiable; 2. P is satisfiable and (a) has one variable; (b) has more than one variable and i. a partial solution that is not contained in a solution; ii. each partial solution is contained in a solution. Case 1: P is not satisfiable. Hence, the MSC G does not admit a stable set of size n and therefore no orbit representatives of a stable set of size n need exist in the MSC of a valid reduction. By Definition 5, P has at least two literals that correspond to the same variable. Removing any such literal produces a proper valid reduction. Case 2a: P is satisfiable and n = 1. Since any symmetric CSP has at least two literals by definition, the MSC G of P is then the complete graph on at least two nodes with the full permutation group acting on it. We can safely remove one node, no matter which one, to obtain an MSC of a proper valid reduction. Case 2(b)i: P is satisfiable, n > 1 and a stable set exists that is not part of any maximum stable set. We can add a hyperedge in G consisting of the nodes in the stable set to obtain G. Case 2(b)ii: We can exclude any stable set S that is not an orbit representative, by adding the n-ary hyperedge S to G to obtain G. Theorem 12 singles out the symmetries that map a solution to a different solution as the important ones for valid reductions. However, before starting to prove the satisfiability of a CSP, we may only know that symmetries exist, e.g., through automatic detection in preprocessing. We cannot assume knowing whether symmetric solutions exist. Informally speaking, Theorem 12 points out symmetries that map every solution into itself as the badly-behaved symmetries. The following is an example of a symmetric CSP with more than 1 solution that does not allow a proper valid reduction. Example 13. Consider a CSP with variables x, y and z each with domain {1, 2, 3}. The solutions are {,, (z, 1)}, {,, (z, 2)}, {,, (z, 3)}, and {(x, 2),, (z, 2)}. The only edges in the microstructure are those that extend to these solutions. The microstructure of this CSP is depicted

6 (x, 2) (z, 1) (z, 2) (z, 3) (z, 4) (z, 5) (z, 2) (z, 3) (z, 1) Figure 5: The microstructure of the CSP in Example 13 which does not admit a proper valid reduction. The only non-trivial symmetry of this CSP swaps the grey-coloured nodes and (z, 3) while being the identity on all other nodes. We can neither remove a node nor remove an edge. in Figure 5. Apart from the identity, only one other automorphism exists. This automorphism swaps with (z, 3) and is the identity on all other literals. Note, that the automorphism maps all solutions into themselves. Every literal is part of a solution whose orbit consists only of itself and so are all pairs of nodes. Hence, we cannot remove a node or an edge. This means that no proper valid reduction of this CSP exists. With another example, we show that we may not always need n-ary no-goods to obtain a proper valid reduction. Example 14. Consider the microstructure of the CSP which is depicted in Figure 6. The edge {(x, 2), } is dashed to facilitate identification. We have grouped the nodes in such a way that the symmetries of the microstructure are best visible. The graph is symmetric about an axis going through the nodes and (z, 1). Other symmetries of the CSP ensure that the 3-cliques to the left of the vertical axis going through nodes and (x, 2) are symmetric to each other and so are the 3-cliques to the right of this axis. The three orbits of the solutions under the symmetry group are as follows. The first orbit consists of {,, (z, a)} and {(x, 2),, (z, b)}, where a {4, 5} and b {2, 3}. In the figure, this corresponds to the 3-cliques to the left of the vertical axis. The second orbit consists of {(x, c),, (z, 1)}, where c {1, 2}. This corresponds to the two 3-cliques in the centre. The third and final orbit consists of the remaining 3-cliques to the right of the vertical axis. If we want to achieve a proper valid reduction of this CSP, without relying on a 3-ary no-good, we could remove the edge between nodes (x, 2) and which produces a proper valid reduction as well. In Figure 6, we have depicted this edge as dotted. This edge is contained in three members of the first orbit of solutions, but not in all. The edge is contained in one member of the second orbit of solutions, but not all. Removing this edge would destroy these four members, but the removal still leaves more than one orbit representative for the two affected orbits. Hence, the removal produces a proper valid reduction. Stronger still, a unary constraint suffices in this example (x, 2) Figure 6: Microstructure of the CSP of Example 14. Removing the dotted edge or the grey node produces a proper valid reduction. (z, 4) (z, 5) (z, 2) (z, 3) (x, 2) (z, 1) Figure 7: Microstructure of the CSP of Example 14. Orbit representatives are thick for {(x, 2),, (z, 1)}, dotted for {(x, 2),, (z, 2)}, and dashed for {,, (z, 1)}. We cannot remove a node or edge from non-orbit representative {(x, 2),, (z, 1)}. to obtain a proper valid reduction. By removing node (x, 2), depicted in grey, we produce a proper valid reduction, since all stable sets above the axis through nodes, (z, 1) are preserved. In fact, we can show that Example 14 is an example for an extension of Theorem 12. If we can produce a proper valid reduction because a symmetry maps a solution to a different solution, we can always produce a proper valid reduction also by using constraints whose arity is at most binary. Theorem 15. Let P be a symmetric CSP. If P is unsatisfiable, then P has a proper valid reduction that can be obtained by adding unary constraints only. If P is satisfiable and has a symmetry φ that maps a solution S to a solution φ(s) such that S φ(s), then it has a proper valid reduction that can be obtained by adding binary constraints only. Proof. Let the symmetric CSP P have n variables. If P is unsatisfiable, we can prove the existence of a proper valid reduction with unary constraints relying on the argu-

7 ments used in Case 1 of the proof of Theorem 12. Let P be satisfiable in the following. If n = 1 we can rely on the arguments used in Case 2a of the proof of Theorem 12. Let n > 1 in the following. By assumption, at least one maximum stable set S exists that is mapped to a different stable set by some symmetry φ in aut(g). Note that φ 1 is a symmetry since φ is a symmetry. Therefore φ 1 (T ) is in the orbit of any maximum stable set T. By abuse of notation we write v 1 = φ 1 (v). Note that φ(s) \ S since S φ(s). Let v be any member of φ(s) \ S and let x be the variable which corresponds to this literal. Let w 1 be the unique member of S which also assigns a value to x. This literals w 1 exists, since S is an assignment of values to all variables. Note that w 1 v but that it may be possible that v = w. Let T {v, w} be any maximum stable set. For the sake of contradiction, we shall assume that each member of the orbit of T contains v. We know that T 1 is in the orbit of T since φ 1 is a symmetry. Since w T it follows that w 1 T 1. By our assumption that node v is contained in all members of the orbit of T, it follows that v and w 1 are both contained in T 1. However, v and w 1 are literals corresponding to two different value assignments to x. By the definition of MSC, we have an edge between nodes v and w 1, and this shows that T 1 cannot be a stable set. Having reached this contradiction, we can safely assume that any stable set T {v, w} has some member in its orbit which does not contain {v, w}. Therefore, we can safely forbid {v, w} while preserving some orbit representative for the orbit of T. Puget originally proved his existence theorem for valid reductions with a binary constraint. The proofs of Theorems 12 and 15 show that if a proper valid reduction exists because there are symmetric solutions, then we can obtain it by adding binary constraints only which is a strengthening of Puget s original result. However, we cannot use a technique as Puget used in his proof due to our Example Single-representative Valid Reductions and Beyond Let us consider a particular class of valid reductions in the following. We call a valid reduction a single-representative valid reduction, if for each orbit of solutions in the original CSP only one solution exists in the single-representative valid reduction. Note that, if a symmetric CSP only has one solution or all solutions are only self-symmetric, a singlerepresentative valid reduction is the original CSP. Example 13 shows a CSP that is a single-representative valid reduction of itself. Figures 3 and 4 show valid reductions that are proper valid reductions and single-representative valid reductions. The proof of Theorem 12 leads to the following result. Corollary 16. Any symmetric CSP admits a singlerepresentative valid reduction. Note that, if we have two distinct, symmetric solutions, a single-representative valid reduction is a proper valid reduction as well. In the proof of Theorem 12, we could have proved Case 2(b)ii constructively with a reference to the generalised lexleader constraint [Walsh, 2006]. Using our proof of Case 2(b)ii however, we obtain a stronger result. Corollary 17. Any symmetric CSP admits a singlerepresentative valid reduction for any choice of orbit representatives. An analogue of the above Corollary 17 for Theorem 15 would be that any symmetric CSP admits a singlerepresentative valid reduction obtained with unary or binary constraints for any choice of orbit representatives. This is not true as the CSP in Example 14 shows. Consider the microstructure as in Figure 7. Let us choose {(x, 2),, (z, 2)} as the orbit representative of the first orbit of solutions to the left of the axis going through and (x, 2). The edges of this 3-clique are depicted as dotted lines. Let the 3-clique {,, (z, 1)} with dashed lines as edges be the orbit representative of the second, inner orbit and let the 3-clique {(x, 2),, (z, 1)} with thick lines as edges be the orbit representative of the third orbit of solutions to the right of the axis going through and (x, 2). We cannot remove an edge or a node from the non-orbit-representative 3-clique in the second orbit {(x, 2),, (z, 1)}. Hence, with this choice of orbit representatives and restricting ourselves to unary and binary constraints for producing a single-representative valid reduction, no single-representative valid reduction exists. Generalised lexleader constraints [Walsh, 2006] have the same arity as the number of variables in general. For some CSPs however, we can reduce the arity of lexleader constraints to 2 [Puget, 2005]. As Example 14 shows, we cannot rely on binary constraints only to produce a single-representative valid reduction for an arbitrary choice of orbit representatives. It remains an open question whether for a CSP with n variables and constraints with arity at most k < n, we can obtain a single-representative valid reduction by adding k-ary constraints only. Since the definition of a single-representative valid reduction focuses on excluding symmetric solutions, and does not specifically exclude symmetric non-solutions, we may still be able to exclude further sets of literals from a singlerepresentative valid reduction. Informally speaking, a singlerepresentative valid reduction may not be the most proper valid reduction. In future work, we will consider symmetric non-solutions and theoretical conditions for the exclusion of symmetric non-solutions via constraints. In practice, we cannot distinguish between orbits of solutions and orbits of non-solutions. Lexicographic ordering constraints [Crawford et al., 1996] exclude orbit members of both solutions and non-solutions. We can produce a singlerepresentative valid reduction with generalised lexleader constraints [Walsh, 2006] constructively. We sacrifice free choice of orbit representatives in this case. Generalised lexleader constraints, however, do not guarantee a single-representative valid reduction that does not exhibit any symmetry of the original CSP. We have seen so in Examples 1 and 9: certain types of symmetries (not symmetric solutions) exist that we cannot eliminate using lexicographic ordering constraints or generalised lexleader constraints. The reason is that adding

8 lexicographic ordering constraints does not change the MSC in these cases. Only unary constraints can eliminate the symmetries in these examples. However, we are not aware of a constructive method that provides unary constraints to produce a single-representative valid reduction. Future work will address the question whether there are less pathological examples where unary constraints are needed to eliminate symmetries. The existence of such an example would mean that we would have to understand the interplay between unary and lexicographic ordering constraints. In general, as shown in Example 13, we know that we cannot always produce a single-representative valid reduction with all symmetries eliminated. In future work, we will consider conditions under which we can guarantee a single-representative valid reduction with all symmetries eliminated. 4 Conclusion We have presented Puget s fundamental work [Puget, 1993] on symmetry breaking in light of the recent definition of symmetry [Cohen et al., 2006]. We have re-proved his central results and strengthened them. Our results suggest that symmetry breaking based on the idea of valid reductions may, in theory, only supply additional information to a problem if symmetric solutions exist. This is somewhat disappointing, since the existence of symmetric solutions can be decided only by solving the CSP. Valid reductions are among the requirements for a constraint to be considered as a symmetry breaking constraint. Hence, they offer a possibility to provide a theoretical upper bound for the power of symmetry breaking constraints. While our proofs suggest that valid reductions allow for constraints that are far from our intuition about symmetry breaking constraints, valid reductions provide theoretical limits for symmetry breaking constraints and offer a different perspective of symmetry breaking constraints. An interesting open question is whether we could theoretically have constraints that lead to single-representative valid reductions that have the same arity as the maximum constraint arity in a CSP. In further work, we will analyse and compare the very diverse symmetry breaking constraints using valid reductions as the framework. predicates for search problems. In Principles of Knowledge Representation and Reasoning (KR 96). Morgan Kaufmann, [Flener et al., 2006] Pierre Flener, Justin Pearson, Meinolf Sellmann, and Pascal Van Hentenryck. Static and dynamic structural symmetry breaking. In Principles and Practice of Constraint Programming CP 2006, volume 4204/2006 of Lecture Notes in Computer Science 4204, 2006, pages , [Freuder, 1991] E. C. Freuder. Eliminating interchangeable values in constraint satisfaction problems. In Proceedings AAAI 91, pages , [Jégou, 1993] Philippe Jégou. Decomposition of domains based on the micro-structure of finite constraintsatisfaction problems. In Proceedings AAAI, pages , [Kaibel and Pfetsch, 2008] Volker Kaibel and Marc E. Pfetsch. Packing and partitioning orbitopes. Mathematical Programming, 114, Number 1 / July, 2008:1 36, [Puget, 1993] Jean-Francois Puget. On the satisfiability of symmetrical constrained satisfaction problems. In Methodologies for Intelligent Systems, pages , London, UK, Springer-Verlag. [Puget, 2005] Jean-Francois Puget. Breaking symmetries in all-different problems. In International Joint Conferences on Artificial Intelligence, pages , [Rossi et al., 2006] Francesca Rossi, Peter van Beek, and Toby Walsh, editors. Handbook of Constraint Programming. Elsevier, [Shlyakhter, 2007] Ilya Shlyakhter. Generating effective symmetry-breaking predicates for search problems. Discrete Applied Mathematics, 155(12): , [Walsh, 2006] Toby Walsh. General symmetry breaking constraints. In Principles and Practice of Constraint Programming CP 2006, volume 4204/2006 of Lecture Notes in Computer Science 4204, 2006, pages , Acknowledgements We would like to thank Timo Berthold, Haiko Müller, Marc E. Pfetsch and Kristina Vušković for helpful discussions on the topic. References [Cambazard et al., 2009] Hadrien Cambazard, Barry O Sullivan, and Barbara M. Smith. A Constraint-Based Approach to Enigma Journal of Computers and Mathematics with Applications, [Cohen et al., 2006] David Cohen, Peter Jeavons, Christopher Jefferson, Karen Petrie, and Barbara Smith. Symmetry definitions for constraint satisfaction problems. Constraints 11, [Crawford et al., 1996] James Crawford, Matthew Ginsberg, Eugene Luks, and Amitabha Roy. Symmetry-breaking

Symmetry Definitions for Constraint Satisfaction Problems

Symmetry Definitions for Constraint Satisfaction Problems Symmetry Definitions for Constraint Satisfaction Problems David Cohen 1, Peter Jeavons 2, Christopher Jefferson 3, Karen E. Petrie 4, and Barbara M. Smith 4 1 Department of Computer Science, Royal Holloway,

More information

Generalized Micro-Structures for Non-Binary CSP

Generalized Micro-Structures for Non-Binary CSP Generalized Micro-Structures for Non-Binary CSP Achref El Mouelhi LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France) achref.elmouelhi@lsis.org

More information

Static and Dynamic Structural Symmetry Breaking

Static and Dynamic Structural Symmetry Breaking Static and Dynamic Structural Symmetry Breaking Pierre Flener 1, Justin Pearson 1, Meinolf Sellmann 2, and Pascal Van Hentenryck 2 1 Dept of Information Technology, Uppsala University, Box 337, 751 05

More information

A Hybrid Tractable Class for Non-Binary CSPs

A Hybrid Tractable Class for Non-Binary CSPs A Hybrid Tractable Class for Non-Binary CSPs Achref El Mouelhi Philippe Jégou Cyril Terrioux LSIS - UMR CNRS 7296 Aix-Marseille Université Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 (France)

More information

Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 27 & July 2/4, 2012

Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 27 & July 2/4, 2012 Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 27 & July 2/4, 2012 vs. complexity For some restricted constraint languages we know some polynomial time algorithms

More information

A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs

A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs 2008 20th IEEE International Conference on Tools with Artificial Intelligence A new Evaluation of Forward Checking and its Consequences on Efficiency of Tools for Decomposition of CSPs Philippe Jégou Samba

More information

arxiv: v1 [cs.ai] 16 Apr 2012

arxiv: v1 [cs.ai] 16 Apr 2012 Symmetry Breaking Constraints: Recent Results Toby Walsh NICTA and UNSW Sydney, Australia toby.walsh@nicta.com.au arxiv:1204.3348v1 [cs.ai] 16 Apr 2012 Abstract Symmetry is an important problem in many

More information

Hybrid tractability of valued constraint problems

Hybrid tractability of valued constraint problems Hybrid tractability of valued constraint problems Martin C. Cooper a, Stanislav Živný,b,c a IRIT, University of Toulouse III, 31062 Toulouse, France b University College, University of Oxford, OX1 4BH

More information

CLASSIFYING THE COMPLEXITY OF CONSTRAINTS USING FINITE ALGEBRAS

CLASSIFYING THE COMPLEXITY OF CONSTRAINTS USING FINITE ALGEBRAS CLASSIFYING THE COMPLEXITY OF CONSTRAINTS USING FINITE ALGEBRAS ANDREI BULATOV, PETER JEAVONS, AND ANDREI KROKHIN Abstract. Many natural combinatorial problems can be expressed as constraint satisfaction

More information

Constraint Symmetries

Constraint Symmetries IRI-TR-17-05 Constraint Symmetries Pol Mestres Vicente Ruiz de Angulo August 2017 Abstract Constraint Symmetries have been suggested as an appropriate subgroup of solution symmetries that can be more easily

More information

Symmetries of Symmetry Breaking Constraints

Symmetries of Symmetry Breaking Constraints Symmetries of Symmetry Breaking Constraints George Katsirelos 1 and Toby Walsh 2 Abstract. Symmetry is an important feature of many constraint programs. We show that any problem symmetry acting on a set

More information

Some hard families of parameterised counting problems

Some hard families of parameterised counting problems Some hard families of parameterised counting problems Mark Jerrum and Kitty Meeks School of Mathematical Sciences, Queen Mary University of London {m.jerrum,k.meeks}@qmul.ac.uk September 2014 Abstract

More information

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009

Symmetries in CSP. Symmetries in CSP. Elena Sherman UNL, CSE. April 18, 2009 Symmetries in CSP Elena Sherman UNL, CSE April 18, 2009 Table of contents Why Symmetry? Symmetry Examples Adding symmetry-breaking global contraints Search space modification Heuristics modification Historical

More information

Computing the Frequency of Partial Orders

Computing the Frequency of Partial Orders Computing the Frequency of Partial Orders M.R.C. van Dongen (dongen@cs.ucc.ie) Centre for Efficiency Orientated Languages, University College Cork Abstract. In this paper we study four algorithms for computing

More information

arxiv: v1 [cs.cc] 9 Oct 2014

arxiv: v1 [cs.cc] 9 Oct 2014 Satisfying ternary permutation constraints by multiple linear orders or phylogenetic trees Leo van Iersel, Steven Kelk, Nela Lekić, Simone Linz May 7, 08 arxiv:40.7v [cs.cc] 9 Oct 04 Abstract A ternary

More information

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS M. N. ELLINGHAM AND JUSTIN Z. SCHROEDER In memory of Mike Albertson. Abstract. A distinguishing partition for an action of a group Γ on a set

More information

On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry

On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry On The Complexity and Completeness of Static Constraints for Breaking Row and Column Symmetry George Katsirelos 1, Nina Narodytska 2, and Toby Walsh 2 1 CRIL-CNRS, Lens, France, email: gkatsi@gmailcom

More information

Dynamic Symmetry Breaking Constraints

Dynamic Symmetry Breaking Constraints Dynamic Symmetry Breaking Constraints George Katsirelos 1 and Toby Walsh 2 Abstract. We present a general method for dynamically posting symmetry breaking constraints during search. The basic idea is very

More information

Symmetry Breaking using Value Precedence

Symmetry Breaking using Value Precedence Symmetry Breaking using Value Precedence Toby Walsh 1 Abstract. We present a comprehensive study of the use of value precedence constraints to break value symmetry. We first give a simple encoding of value

More information

Isomorphisms between pattern classes

Isomorphisms between pattern classes Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.

More information

Fundamental Domains for Integer Programs with Symmetries

Fundamental Domains for Integer Programs with Symmetries Fundamental Domains for Integer Programs with Symmetries Eric J. Friedman Cornell University, Ithaca, NY 14850, ejf27@cornell.edu, WWW home page: http://www.people.cornell.edu/pages/ejf27/ Abstract. We

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Symmetry Breaking in Graceful Graphs

Symmetry Breaking in Graceful Graphs Symmetry Breaking in Graceful Graphs Karen E. Petrie and Barbara M. Smith University of Huddersfield, Huddersfield HD1 3DH, U.K. [k.e.petrie,b.m.smith]@hud.ac.uk Abstract. Symmetry in a Constraint Satisfaction

More information

The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs

The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs Maria Axenovich and Jonathan Rollin and Torsten Ueckerdt September 3, 016 Abstract An ordered graph G is a graph whose vertex set

More information

K 4 -free graphs with no odd holes

K 4 -free graphs with no odd holes K 4 -free graphs with no odd holes Maria Chudnovsky 1 Columbia University, New York NY 10027 Neil Robertson 2 Ohio State University, Columbus, Ohio 43210 Paul Seymour 3 Princeton University, Princeton

More information

Revisiting the Limits of MAP Inference by MWSS on Perfect Graphs

Revisiting the Limits of MAP Inference by MWSS on Perfect Graphs Revisiting the Limits of MAP Inference by MWSS on Perfect Graphs Adrian Weller University of Cambridge CP 2015 Cork, Ireland Slides and full paper at http://mlg.eng.cam.ac.uk/adrian/ 1 / 21 Motivation:

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

AN ALGORITHM FOR CONSTRUCTING A k-tree FOR A k-connected MATROID

AN ALGORITHM FOR CONSTRUCTING A k-tree FOR A k-connected MATROID AN ALGORITHM FOR CONSTRUCTING A k-tree FOR A k-connected MATROID NICK BRETTELL AND CHARLES SEMPLE Dedicated to James Oxley on the occasion of his 60th birthday Abstract. For a k-connected matroid M, Clark

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS

ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS SIMON M. SMITH Abstract. If G is a group acting on a set Ω and α, β Ω, the digraph whose vertex set is Ω and whose arc set is the orbit (α, β)

More information

Finite Induced Graph Ramsey Theory: On Partitions of Subgraphs

Finite Induced Graph Ramsey Theory: On Partitions of Subgraphs inite Induced Graph Ramsey Theory: On Partitions of Subgraphs David S. Gunderson and Vojtěch Rödl Emory University, Atlanta GA 30322. Norbert W. Sauer University of Calgary, Calgary, Alberta, Canada T2N

More information

k-blocks: a connectivity invariant for graphs

k-blocks: a connectivity invariant for graphs 1 k-blocks: a connectivity invariant for graphs J. Carmesin R. Diestel M. Hamann F. Hundertmark June 17, 2014 Abstract A k-block in a graph G is a maximal set of at least k vertices no two of which can

More information

Identifying Graph Automorphisms Using Determining Sets

Identifying Graph Automorphisms Using Determining Sets Identifying Graph Automorphisms Using Determining Sets Debra L. Boutin Department of Mathematics Hamilton College, Clinton, NY 13323 dboutin@hamilton.edu Submitted: May 31, 2006; Accepted: Aug 22, 2006;

More information

Breaking variable symmetry in almost injective problems

Breaking variable symmetry in almost injective problems Breaking variable symmetry in almost injective problems Philippe Vismara 1,2 and Remi Coletta 1 1 LIRMM, UMR5506 Université Montpellier II - CNRS, Montpellier, France {coletta,vismara}@lirmm.fr 2 MISTEA,

More information

Perfect matchings in highly cyclically connected regular graphs

Perfect matchings in highly cyclically connected regular graphs Perfect matchings in highly cyclically connected regular graphs arxiv:1709.08891v1 [math.co] 6 Sep 017 Robert Lukot ka Comenius University, Bratislava lukotka@dcs.fmph.uniba.sk Edita Rollová University

More information

Edge colored complete bipartite graphs with trivial automorphism groups

Edge colored complete bipartite graphs with trivial automorphism groups Edge colored complete bipartite graphs with trivial automorphism groups Michael J. Fisher Garth Isaak Abstract We determine the values of s and t for which there is a coloring of the edges of the complete

More information

Automorphism groups of wreath product digraphs

Automorphism groups of wreath product digraphs Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy

More information

Snake Lex: an Alternative to Double Lex

Snake Lex: an Alternative to Double Lex Snake Lex: an Alternative to Double Lex Andrew Grayland 1, Ian Miguel 1 and Colva M. Roney-Dougal 2 (andyg@cs, ianm@cs, colva@mcs).st-and.ac.uk (1. School of Comp. Sci., 2. School of Maths and Stats),

More information

A Generalisation of the Backtracking Algorithm

A Generalisation of the Backtracking Algorithm A Generalisation of the Backtracking Algorithm M.R.C. van Dongen Cork Constraint Computation Centre, Computer Science Department, University College Cork, dongen@cs.ucc.ie Abstract. This paper presents

More information

c 2010 Society for Industrial and Applied Mathematics

c 2010 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 24, No. 3, pp. 1038 1045 c 2010 Society for Industrial and Applied Mathematics SET SYSTEMS WITHOUT A STRONG SIMPLEX TAO JIANG, OLEG PIKHURKO, AND ZELEALEM YILMA Abstract. A

More information

The computational complexity of dominance and consistency in CP-nets

The computational complexity of dominance and consistency in CP-nets The computational complexity of dominance and consistency in CP-nets Judy Goldsmith Dept. of Comp. Sci. University of Kentucky Lexington, KY 40506-0046, USA goldsmit@cs.uky.edu Abstract Jérôme Lang IRIT

More information

THERE ARE NO PURE RELATIONAL WIDTH 2 CONSTRAINT SATISFACTION PROBLEMS. Keywords: Computational Complexity, Constraint Satisfaction Problems.

THERE ARE NO PURE RELATIONAL WIDTH 2 CONSTRAINT SATISFACTION PROBLEMS. Keywords: Computational Complexity, Constraint Satisfaction Problems. THERE ARE NO PURE RELATIONAL WIDTH 2 CONSTRAINT SATISFACTION PROBLEMS Departament de tecnologies de la informació i les comunicacions, Universitat Pompeu Fabra, Estació de França, Passeig de la circumval.laci

More information

The chromatic number of ordered graphs with constrained conflict graphs

The chromatic number of ordered graphs with constrained conflict graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 69(1 (017, Pages 74 104 The chromatic number of ordered graphs with constrained conflict graphs Maria Axenovich Jonathan Rollin Torsten Ueckerdt Department

More information

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow.

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow. Berge Trigraphs Maria Chudnovsky 1 Princeton University, Princeton NJ 08544 March 15, 2004; revised December 2, 2005 1 This research was partially conducted during the period the author served as a Clay

More information

Multi-coloring and Mycielski s construction

Multi-coloring and Mycielski s construction Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles

More information

Automatic Generation of Redundant Models for Permutation Constraint Satisfaction Problems

Automatic Generation of Redundant Models for Permutation Constraint Satisfaction Problems Manuscript Latex Source Click here to download Manuscript: article.tex 0 0 0 0 0 0 Automatic Generation of Redundant Models for Permutation Constraint Satisfaction Problems Y.C. Law and J.H.M. Lee Department

More information

arxiv: v1 [cs.cc] 5 Dec 2018

arxiv: v1 [cs.cc] 5 Dec 2018 Consistency for 0 1 Programming Danial Davarnia 1 and J. N. Hooker 2 1 Iowa state University davarnia@iastate.edu 2 Carnegie Mellon University jh38@andrew.cmu.edu arxiv:1812.02215v1 [cs.cc] 5 Dec 2018

More information

THE REPRESENTATION THEORY, GEOMETRY, AND COMBINATORICS OF BRANCHED COVERS

THE REPRESENTATION THEORY, GEOMETRY, AND COMBINATORICS OF BRANCHED COVERS THE REPRESENTATION THEORY, GEOMETRY, AND COMBINATORICS OF BRANCHED COVERS BRIAN OSSERMAN Abstract. The study of branched covers of the Riemann sphere has connections to many fields. We recall the classical

More information

Internal Symmetry. Marijn Heule 1 and Toby Walsh 2

Internal Symmetry. Marijn Heule 1 and Toby Walsh 2 Internal Symmetry Marijn Heule 1 and Toby Walsh 2 1 Delft University of Technology, The Netherlands marijn@heule.nl 2 NICTA and UNSW, Sydney, Australia toby.walsh@nicta.com.au Abstract. We have been studying

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Disjunctive Temporal Reasoning in Partially Ordered Models of Time

Disjunctive Temporal Reasoning in Partially Ordered Models of Time From: AAAI-00 Proceedings Copyright 2000, AAAI (wwwaaaiorg) All rights reserved Disjunctive Temporal Reasoning in Partially Ordered Models of Time Mathias Broxvall and Peter Jonsson Department of Computer

More information

Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums

Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums Combining Symmetry Breaking with Other Constraints: lexicographic ordering with sums Brahim Hnich 1, Zeynep Kiziltan 2, and Toby Walsh 1 1 Cork Constraint Computation Center, University College Cork, Ireland.

More information

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Generalized Pigeonhole Properties of Graphs and Oriented Graphs Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER

More information

Symmetry. Pierre Flener. ACP Summer School Aussois (France), 5 and 6 May ASTRA Research Group on CP Uppsala University Sweden

Symmetry. Pierre Flener. ACP Summer School Aussois (France), 5 and 6 May ASTRA Research Group on CP Uppsala University Sweden Pierre Flener ASTRA Research Group on CP Uppsala University Sweden ACP Summer School Aussois (France), 5 and 6 May 2010 Outline Dynamic Static Static Dynamic 1 2 Dynamic Static 3 Static Dynamic 4 5 6 May

More information

Symmetries of Symmetry Breaking Constraints

Symmetries of Symmetry Breaking Constraints Symmetries of Symmetry Breaking Constraints George Katsirelos NICTA, Sydney, Australia george.katsirelos@nicta.com.au Toby Walsh NICTA and UNSW, Sydney, Australia toby.walsh@nicta.com.au Abstract Symmetry

More information

arxiv: v2 [cs.cc] 2 Oct 2011

arxiv: v2 [cs.cc] 2 Oct 2011 SCHAEFER S THEOREM FOR GRAPHS MANUEL BODIRSKY AND MICHAEL PINSKER arxiv:1011.2894v2 [cs.cc] 2 Oct 2011 Abstract. Schaefer s theorem is a complexity classification result for so-called Boolean constraint

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

arxiv: v1 [math.co] 28 Oct 2016

arxiv: v1 [math.co] 28 Oct 2016 More on foxes arxiv:1610.09093v1 [math.co] 8 Oct 016 Matthias Kriesell Abstract Jens M. Schmidt An edge in a k-connected graph G is called k-contractible if the graph G/e obtained from G by contracting

More information

Regular and synchronizing transformation monoids

Regular and synchronizing transformation monoids Regular and synchronizing transformation monoids Peter J. Cameron NBSAN, York 23 November 2011 Mathematics may be defined as the subject in which we never know what we are talking about, nor whether what

More information

The Extendable-Triple Property: a new CSP Tractable Class beyond BTP

The Extendable-Triple Property: a new CSP Tractable Class beyond BTP The Extendable-Triple Property: a new CSP Tractable Class beyond BTP Philippe Jégou and Cyril Terrioux Aix-Marseille Université, CNRS LSIS UMR 7296 Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

On the hardness of losing weight

On the hardness of losing weight On the hardness of losing weight Andrei Krokhin 1 and Dániel Marx 2 1 Department of Computer Science, Durham University, Durham, DH1 3LE, UK andrei.krokhin@durham.ac.uk 2 Department of Computer Science

More information

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Mirosław Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA Abstract. We present

More information

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008

Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Math 541 Fall 2008 Connectivity Transition from Math 453/503 to Math 541 Ross E. Staffeldt-August 2008 Closed sets We have been operating at a fundamental level at which a topological space is a set together

More information

A Hilton-Milner-type theorem and an intersection conjecture for signed sets

A Hilton-Milner-type theorem and an intersection conjecture for signed sets A Hilton-Milner-type theorem and an intersection conjecture for signed sets Peter Borg Department of Mathematics, University of Malta Msida MSD 2080, Malta p.borg.02@cantab.net Abstract A family A of sets

More information

arxiv: v1 [math.co] 13 May 2016

arxiv: v1 [math.co] 13 May 2016 GENERALISED RAMSEY NUMBERS FOR TWO SETS OF CYCLES MIKAEL HANSSON arxiv:1605.04301v1 [math.co] 13 May 2016 Abstract. We determine several generalised Ramsey numbers for two sets Γ 1 and Γ 2 of cycles, in

More information

arxiv: v3 [math.co] 6 Jul 2017

arxiv: v3 [math.co] 6 Jul 2017 Duality theorems for blocks and tangles in graphs Reinhard Diestel, Philipp Eberenz and Joshua Erde July 7, 2017 arxiv:1605.09139v3 [math.co] 6 Jul 2017 Abstract We prove a duality theorem applicable to

More information

Symmetry Breaking in Subgraph Pattern Matching

Symmetry Breaking in Subgraph Pattern Matching Symmetry Breaking in Subgraph Pattern Matching Stéphane Zampelli, Yves Deville, and Pierre Dupont Université Catholique de Louvain, Department of Computing Science and Engineering, 2, Place Sainte-Barbe

More information

Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics Lecture notes in progress (27 March 2010)

Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics Lecture notes in progress (27 March 2010) http://math.sun.ac.za/amsc/sam Seminaar Abstrakte Wiskunde Seminar in Abstract Mathematics 2009-2010 Lecture notes in progress (27 March 2010) Contents 2009 Semester I: Elements 5 1. Cartesian product

More information

Coloring square-free Berge graphs

Coloring square-free Berge graphs Coloring square-free Berge graphs Maria Chudnovsky Irene Lo Frédéric Maffray Nicolas Trotignon Kristina Vušković September 30, 2015 Abstract We consider the class of Berge graphs that do not contain a

More information

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes

More information

Making Bound Consistency as Effective as Arc Consistency

Making Bound Consistency as Effective as Arc Consistency Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI-09) Making Bound Consistency as Effective as Arc Consistency Christian Bessiere LIRMM-CNRS U. Montpellier,

More information

The approximability of Max CSP with fixed-value constraints

The approximability of Max CSP with fixed-value constraints The approximability of Max CSP with fixed-value constraints Vladimir Deineko Warwick Business School University of Warwick, UK Vladimir.Deineko@wbs.ac.uk Mikael Klasson Dep t of Computer and Information

More information

Automata Theory and Formal Grammars: Lecture 1

Automata Theory and Formal Grammars: Lecture 1 Automata Theory and Formal Grammars: Lecture 1 Sets, Languages, Logic Automata Theory and Formal Grammars: Lecture 1 p.1/72 Sets, Languages, Logic Today Course Overview Administrivia Sets Theory (Review?)

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

Chapter One. Affine Coxeter Diagrams

Chapter One. Affine Coxeter Diagrams Chapter One Affine Coxeter Diagrams By the results summarized in Chapter VI, Section 43, of [3], affine Coxeter groups can be characterized as groups generated by reflections of an affine space (by which

More information

Copyright 2013 Springer Science+Business Media New York

Copyright 2013 Springer Science+Business Media New York Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media

More information

Abstract & Applied Linear Algebra (Chapters 1-2) James A. Bernhard University of Puget Sound

Abstract & Applied Linear Algebra (Chapters 1-2) James A. Bernhard University of Puget Sound Abstract & Applied Linear Algebra (Chapters 1-2) James A. Bernhard University of Puget Sound Copyright 2018 by James A. Bernhard Contents 1 Vector spaces 3 1.1 Definitions and basic properties.................

More information

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic Introduction to EF-games Inexpressivity results for first-order logic Normal forms for first-order logic Algorithms and complexity for specific classes of structures General complexity bounds Preliminaries

More information

Connectivity and tree structure in finite graphs arxiv: v5 [math.co] 1 Sep 2014

Connectivity and tree structure in finite graphs arxiv: v5 [math.co] 1 Sep 2014 Connectivity and tree structure in finite graphs arxiv:1105.1611v5 [math.co] 1 Sep 2014 J. Carmesin R. Diestel F. Hundertmark M. Stein 20 March, 2013 Abstract Considering systems of separations in a graph

More information

An approximate version of Hadwiger s conjecture for claw-free graphs

An approximate version of Hadwiger s conjecture for claw-free graphs An approximate version of Hadwiger s conjecture for claw-free graphs Maria Chudnovsky Columbia University, New York, NY 10027, USA and Alexandra Ovetsky Fradkin Princeton University, Princeton, NJ 08544,

More information

PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE

PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE D-MAXIMAL SETS PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE Abstract. Soare [23] proved that the maximal sets form an orbit in E. We consider here D-maximal sets, generalizations of maximal sets introduced

More information

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events

Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle

More information

The complexity of recursive constraint satisfaction problems.

The complexity of recursive constraint satisfaction problems. The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department

More information

Vertex colorings of graphs without short odd cycles

Vertex colorings of graphs without short odd cycles Vertex colorings of graphs without short odd cycles Andrzej Dudek and Reshma Ramadurai Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 1513, USA {adudek,rramadur}@andrew.cmu.edu

More information

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 3 CHAPTER 1 SETS, RELATIONS, and LANGUAGES 6. Closures and Algorithms 7. Alphabets and Languages 8. Finite Representation

More information

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES JOSHUA BIDERMAN, KEVIN CUDDY, ANG LI, MIN JAE SONG Abstract. In this paper we present a graph property with sensitivity Θ( n), where n = ( v 2) is the

More information

Deciding the Bell number for hereditary graph properties. A. Atminas, A. Collins, J. Foniok and V. Lozin

Deciding the Bell number for hereditary graph properties. A. Atminas, A. Collins, J. Foniok and V. Lozin Deciding the Bell number for hereditary graph properties A. Atminas, A. Collins, J. Foniok and V. Lozin REPORT No. 11, 2013/2014, spring ISSN 1103-467X ISRN IML-R- -11-13/14- -SE+spring Deciding the Bell

More information

Breaking Value Symmetries in Matrix Models using Channeling Constraints

Breaking Value Symmetries in Matrix Models using Channeling Constraints Breaking Value Symmetries in Matrix Models using Channeling Constraints Y.C. Law Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong yclaw@cse.cuhk.edu.hk

More information

Decomposing planar cubic graphs

Decomposing planar cubic graphs Decomposing planar cubic graphs Arthur Hoffmann-Ostenhof Tomáš Kaiser Kenta Ozeki Abstract The 3-Decomposition Conjecture states that every connected cubic graph can be decomposed into a spanning tree,

More information

Bisimulation for conditional modalities

Bisimulation for conditional modalities Bisimulation for conditional modalities Alexandru Baltag and Giovanni Ciná Institute for Logic, Language and Computation, University of Amsterdam March 21, 2016 Abstract We give a general definition of

More information

Using Determining Sets to Distinguish Kneser Graphs

Using Determining Sets to Distinguish Kneser Graphs Using Determining Sets to Distinguish Kneser Graphs Michael O. Albertson Department of Mathematics and Statistics Smith College, Northampton MA 01063 albertson@math.smith.edu Debra L. Boutin Department

More information

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu** 4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published

More information

Measure Theory and Lebesgue Integration. Joshua H. Lifton

Measure Theory and Lebesgue Integration. Joshua H. Lifton Measure Theory and Lebesgue Integration Joshua H. Lifton Originally published 31 March 1999 Revised 5 September 2004 bstract This paper originally came out of my 1999 Swarthmore College Mathematics Senior

More information

MINIMALLY NON-PFAFFIAN GRAPHS

MINIMALLY NON-PFAFFIAN GRAPHS MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect

More information

Painting Squares in 2 1 Shades

Painting Squares in 2 1 Shades Painting Squares in 1 Shades Daniel W. Cranston Landon Rabern May 1, 014 Abstract Cranston and Kim conjectured that if G is a connected graph with maximum degree and G is not a Moore Graph, then χ l (G

More information

Local finiteness, distinguishing numbers, and Tucker s conjecture

Local finiteness, distinguishing numbers, and Tucker s conjecture Local finiteness, distinguishing numbers, and Tucker s conjecture Florian Lehner Department of Mathematics University of Hamburg Hamburg, Germany mail@florian-lehner.net Rögnvaldur G. Möller School of

More information